General

  • Target

    de4cbc39a0f7d5180b2c07e4c4ede60e2ec07a173fb7eabc673f0761590a2bfc

  • Size

    487KB

  • Sample

    240618-z3sd1awgqg

  • MD5

    a7ba07ae53d5000b6bebba8bee7c8265

  • SHA1

    81a6d1ba919ab3dc64077b4aa1885f31edd2a32f

  • SHA256

    de4cbc39a0f7d5180b2c07e4c4ede60e2ec07a173fb7eabc673f0761590a2bfc

  • SHA512

    7557070e8315a002759624a0787f2d587f559d4795496d1cc69f9c69aa843cfe9195e213f7daf0468722bb3676118e8cb28021d9ae29ce51e9688ca54942dd41

  • SSDEEP

    6144:LLhRgmgjPuTGfJxXoRxormLiNLJo0EY0TD3GGZaIiqdhkK7i+hu4:LIm6zfYR2rmLiNgYarGCavq0Kr

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

9a3efc

C2

http://check-ftp.ru

Attributes
  • install_dir

    b9695770f1

  • install_file

    Dctooux.exe

  • strings_key

    1d3a0f2941c4060dba7f23a378474944

  • url_paths

    /forum/index.php

rc4.plain

Targets

    • Target

      de4cbc39a0f7d5180b2c07e4c4ede60e2ec07a173fb7eabc673f0761590a2bfc

    • Size

      487KB

    • MD5

      a7ba07ae53d5000b6bebba8bee7c8265

    • SHA1

      81a6d1ba919ab3dc64077b4aa1885f31edd2a32f

    • SHA256

      de4cbc39a0f7d5180b2c07e4c4ede60e2ec07a173fb7eabc673f0761590a2bfc

    • SHA512

      7557070e8315a002759624a0787f2d587f559d4795496d1cc69f9c69aa843cfe9195e213f7daf0468722bb3676118e8cb28021d9ae29ce51e9688ca54942dd41

    • SSDEEP

      6144:LLhRgmgjPuTGfJxXoRxormLiNLJo0EY0TD3GGZaIiqdhkK7i+hu4:LIm6zfYR2rmLiNgYarGCavq0Kr

    Score
    10/10
    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks